shoyo / acoustic-keylogger
Pipeline of a keylogging attack using just an audio signal and unsupervised learning.
☆146Updated 2 years ago
Alternatives and similar repositories for acoustic-keylogger:
Users that are interested in acoustic-keylogger are comparing it to the libraries listed below
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆282Updated 2 years ago
- Recovers pixelized text from images☆179Updated 3 years ago
- United States Air Force Academy public tools☆18Updated 3 months ago
- A collection of pwn/CTF related utilities for Ghidra☆665Updated 5 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,125Updated last year
- its like a tricorder, for your wireless world.☆110Updated last year
- Yet another Stego Tool☆370Updated last year
- ☆128Updated 2 years ago
- A targeted DNS cache poisoner☆117Updated 2 years ago
- Running Hashcat on Google Colab with session backup and restore.☆727Updated 3 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆438Updated 4 months ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆93Updated 3 years ago
- Poor man's rubber ducky☆72Updated 6 years ago
- ☆92Updated 2 years ago
- Use random bot scanning the internet to seed a Conways Game of Life running on a small LCD on my desk☆40Updated 4 years ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆272Updated last year
- Poor mans Bash Bunny☆85Updated 6 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆237Updated 2 weeks ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆201Updated 5 months ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,078Updated last year
- Hands-on workshop on the basics of hardware hacking.☆118Updated last year
- ☆154Updated 2 weeks ago
- Very simple script(s) to hasten binary exploit creation☆92Updated 3 years ago
- ☆550Updated last year
- A Bluetooth low energy capture the flag☆683Updated 6 months ago
- A CTF platform used in IceCTF 2016☆67Updated 4 years ago
- ☆66Updated 2 years ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆38Updated last month
- A hashcat-based distributed password cracking system☆150Updated 6 months ago
- Voltage glitcher to bypass instructions/bootloader protections *without* target modification☆124Updated 4 years ago